[qubes-users] Re: Windows tools - vanishing displays

2016-09-19 Thread Drew White
The other issue I should note, whenever the VM is being used, when it's using 
the Qubes Display Driver, the mouse in Dom0 flickers whenever it's over the top 
of the displayed area that is Win7.

I even disabled the Desktop, turned off desktop icons, altered the windows 
configuration to get it working faster.

However, setting NoDesktop seems to stop the system from booting properly into 
seamless mode. It keeps waiting for QRExec to start, but it never does.

Is QRExec tied into the physical desktop and backdrop/background?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/a0c24389-59ab-4697-9b43-89ac60b2c468%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Windows tools - vanishing displays

2016-09-19 Thread Drew White
On Tuesday, 20 September 2016 00:06:45 UTC+10, grzegorz@gmail.com  wrote:
> W dniu poniedziałek, 19 września 2016 04:48:11 UTC+2 użytkownik Drew White 
> napisał:
> Are you running dual monitors or a high dpi one? I remember a bug that caused 
> seamless Windows to not work on these displays.

I reduced to 2 monitors to see if that fixed it, but it didn't.
Before I updated the tools, when I had the tools working they worked with the 
single display.

This one however doesn't even do that. If I have 1 display, it still does 
exactly the same thing.

I've had windows tools working on 4 monitors before, so I know that that isn't 
the problem.

4 monitors meaning 1@1680x1050(pri) 2@1920x1080 1@1440x900

And it did work fine.

But since I updated, as I said, fully updated, it is not working properly with 
the tools.


The prior issue with the tools was that seamless mode didn't work AT ALL. and 
NOTHING AT ALL showed up on the screen if it was seamless on a large resolution.
HOWEVER, the workaround for that one, I did tell ages ago, was to have it 
running and have a seamless window open, then plug in the extra monitors and 
have the system recognise them 1 by 1. That way, the seamless desktop grew 
after initialising on a low resolution.

But just trying to initialise it on a large resolution OR screen/display caused 
it to not work.

So I still don't know what is wrong here. But I keep hoping there will be a 
patch that will fix the tools, since they have been broken since Qubes 2 (in 
some way), but they are improving and hopefully soon they will be fully 
functional.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/aee2c927-e757-400f-b655-beb236c021de%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Booting Cubes, Migration

2016-09-19 Thread johnyjukya
> Anaconda is notorious for messing up specific requests for volume
> layout. You would stand a much better chance of getting help in a fedora
> or redhat forum... they have many more people experienced with this.

Cool, thanks.  I guess it is a more general grub/luks/lvm issue, and not
necessarily Qubes-specific.

> As for copying all of /var/lib/qubes, I'm not sure its a 100% clean way
> to do it transferring old qubes.xml directly would be a concern (but
> I may be wrong). Qubes does make it possible to copy a vm's folder into
> /vm-templates or /appvms, then run qvm-add-template or qvm-add-appvm to
> add vms one-by-one into the current system.

Interesting.  In the past, I have had success in moving a single VM by
creating a new VM with the same settings as the old one, then replacing
the files in the vm's directory.  (Sort of the reverse order of what you
mentioned.)

Now, if I can only get the booting working . . .  :)

JJ

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6b7c4e837761ed4ab91e0070d33f8c07.webmail%40localhost.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] USB hotplug messing up other USB devices?

2016-09-19 Thread johnyjukya
Qubes 3.2rc3-testing (and earlier), AMD Athlon X2, GeForce motherboard,
NVidia MCP61 USB controller:

I'm currently running Qubes from an external USB drive.  (Moving to
internal drive as soon as I figure out how to smoothly migrate it.)  For
now, it works great in general.

In the meantime, I've noticed the odd corruption where the root drive
flips into R/O mode (and the system obviously becomes useless).  A reboot,
fsck, reboot gets me back on track, usually with just a journal recovery,
sometimes with the odd recovered inode/count of some recently created
files.  (No major file corruption yet, thankfully.)

I believe one thing that seems to kick in this problem, is
plugging/unplugging *other* USB devices (on same USB bus).  It seems to
sometime upset existing USB drives.

Has anyone else experienced this?

The next time it happens, I'll post some logs.  I think it's fairly
reproducable.  I'm scanning through some old USB drives tomorrow, so I'm
sure it will re-occur, and I'll post some more details.

Thanks.

JJ

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/709e74ac4195b0c9a175d71b17c4dce4.webmail%40localhost.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] VA-API in AppVM

2016-09-19 Thread Sebastian Jug
Hi Andrew,

Thanks for the response.
I can watch youtube a variety of different ways with different codecs and
decoders, however, they all use a ton of CPU usage at 720p or greater.
VAAPI is hardware decoding acceleration for Intel, so that way it uses 1-3%
CPU vs 30-80%.
I realize that 3d acceleration is not an option, but is VAAPI possible?



On Thu, Sep 15, 2016 at 4:34 AM Andrew David Wong  wrote:

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> On 2016-09-14 10:42, Sebastian Jug wrote:
> > Hey guys,
> >
> > A big problem for me with Qubes is being able to do random mundane
> > tasks like watching YouTube videos. Is it possible to get video
> > acceleration working in appvm specifically VA-API?
> >
> > I know the 3d acceleration is not possible unless it's in a HVM but
> > this may be more straightforward?
> >
> > Thanks.
> >
>
> Can you be more specific about the problem you're currently
> encountering? A lot of people here watch YouTube videos in
> AppVMs without any problem (myself included).
>
> - --
> Andrew David Wong (Axon)
> Community Manager, Qubes OS
> https://www.qubes-os.org
> -BEGIN PGP SIGNATURE-
>
> iQIcBAEBCgAGBQJX2l0MAAoJENtN07w5UDAwUIEQAIyn4nQ8wys7Da9aTReeekw/
> vZ4rV1a0ROVLWMOzWXA8VjceizYo701qdYShpZwGQ593dFBd1WGmJliNV9FZfEGX
> 9NFEI5u9zoy2Gvb1do4ji+WzdzT1r4RXsyFlWLhu0CEKEvmEFmYv4DNwHQroaD95
> hTc02GwGbz/LS9qtYjLliLWi9Irh9CHKePRZg3jJVYyXsGH4XgtIuZ4tsXvStNIl
> 2jU+Z6nIZ8Xdmc/puXUpC/CNmSdERqr67al9LTBfiIX7Y15Fk5Nr6hdwto2D8wW/
> 5IBFyAidA0masIcV0m0DT3X1qfaCroDw1MirlOSX+8QqoY5HUraM5b+5G1R2+7D6
> zlt2x7MKfttYTdyYYV422tifXN3WN24mTz7MeWBgzDfF9ttpDAl20GFvrHwqzfLV
> /Sdnf3zuc5MqDey1TpEA1fQ0n1+JDuR10eCx3GOZpIuQqNfL2Gn3nxgPLyMUub1z
> bY8LO/WGGjRXX0+mbQXH0P6cipYedNWVWkh/ogBWhguBUMJ7PYEjd0bmvWhwb2VM
> 1gu2vIG2Z71flO9B12xkkS2YP6CKlQzVPEQyef3bbLGEdM2WZgEFt+FT5TzzcgMn
> +HjieUGy8VtnQqj/FbQrJg549UdpEPmhTddrBbhhofEeZZC6L5xUbizzj8cFTIw1
> zkPEQP56aiBKfvxSffhO
> =F4Ga
> -END PGP SIGNATURE-
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAD6cem7qThKjF0sXcjL9MVY1fyGUGar5gsu%3D4WA7Mt3fVEDdtg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] WHERE is VT-D implemented..?

2016-09-19 Thread neilhardley
Quick question.

WHERE is VT-D protection against DMA attacks implemented..?

Is it implemented at a particular VM, such as

"sys-net"

or

"sys-firewall"

Or is this just built-in to the entire Qubes system regardless of which VM you 
are using..?

If I were to run something like

wget google.com

within "sys-net" terminal

Would that be protected by VT-D..?

Thanks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/28354a3a-a7bc-4d91-8d21-76f4201f30e2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Booting Cubes, Migration

2016-09-19 Thread Chris Laprise

On 09/19/2016 04:25 PM, johnyju...@sigaint.org wrote:

Any suggestions?


Anaconda is notorious for messing up specific requests for volume 
layout. You would stand a much better chance of getting help in a fedora 
or redhat forum... they have many more people experienced with this.


As for copying all of /var/lib/qubes, I'm not sure its a 100% clean way 
to do it transferring old qubes.xml directly would be a concern (but 
I may be wrong). Qubes does make it possible to copy a vm's folder into 
/vm-templates or /appvms, then run qvm-add-template or qvm-add-appvm to 
add vms one-by-one into the current system.


Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/bea8542f-4842-4489-2ed6-9eac62ef2543%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] VPN in proxyVM

2016-09-19 Thread Chris Laprise

On 09/19/2016 05:48 AM, asdfg...@sigaint.org wrote:

Hello
I have this configuration

sys-whonix--->proxyVM(with VPN)--->appVM

when I surf in appVM, see ip of tor and not ip of VPN. Why?

Regards



If the appvm is directly using the vpn vm as its netvm (uplink), you 
should see the vpn's address when browsing to a site like whatismyip.com.


Chris

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9945f7b0-ca20-43fc-cc3a-f672d0982d36%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Booting Cubes, Migration

2016-09-19 Thread johnyjukya
> I've finally got Qubes set up in a way I'm comfortable working every day.
>
> Now I wanted to move that same installation to another drive for its
> permanent home.

Oh, I also meant to ask this:

Does all of the Template/VM state live in /var/lib/qubes?  Obviously the
machines' disks do, and it appears that the metadata associated with them
lives in /var/lib/qubes/qubes.xml (not human readable, tho').

Is this correct?  If I do a fresh install of Qubes, and (with no VM's
running) bring over my whole /var/lib/qubes directory from another
installation, reboot, would I be good to go?  Or are there other subtle
things in dom0's root drive that would be out of kilter?

(It'd be nice to see the VM's and their state not being tied to anything
beyond /var/lib/qubes.  Seems a lot cleaner that way.)

Thanks.

JJ

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8eab0f3d61be02c5d52b065607832d5b.webmail%40localhost.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] i3

2016-09-19 Thread Jon Solworth
I'm using i3, and I like it so far better than
kde or xfce, but its definitely not the window
manager to start using qubes with.

I have some questions

1. https://www.qubes-os.org/doc/i3/ is very helpful,
   but I'm a bit confused by the configuration instructions
   at the bottom.  It says to install a script qubes_autostart_xdg.sh
   but it doesn't say 
 (a) in which domain
 (b) in which directory
 (c) what filename should be used
   (It would also be helpful to know what the script is needed for)

2. What should I use to launch individual applications from the status
   bar (e.g., keypassx or firefox)?  I'll make key bindings for some,
   but I'll want others on the bar.  These are security sensitive,
   aren't they, since they run in dom0?

3. Is there a recommended way of bringing up VMs?  I'm using qvm-start
   for the VM, and .config/autostart for applications I always want to
   started in the VM.  Any better suggestions?

4. nm_applet seems to sometimes go away.  Any suggestions?

5. I would be pleased to see other peoples config files.

thanks,
Jon

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8bba5f66-afb2-4868-a773-f7b5610d28aa%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Booting Cubes, Migration

2016-09-19 Thread johnyjukya
I've finally got Qubes set up in a way I'm comfortable working every day.

Now I wanted to move that same installation to another drive for its
permanent home.

The current drive has a standard bios /boot partition (sda1), and an
encrypted extended partition (#5) containing lvm with swap and /.

The destination drive has a few existing partitions on it, #2 - Extended
partition containing #5/#6/#7 which are a few encrypted partitions
containing some data I'd like to keep.

The destination drive has a 500M empty space at the start ready for
partition #1 (/boot) and 550G at the end, ready for partition #8, a future
encrypted partition, which will contain a physical volume/volume group
containing the logical volumes for swap and /.

1) First attempt to migrate, I created the new /boot partition by hand,
rsync'd from the old.  Similarly, I created the new encrypted partition,
added the pv,vg,lvm's for swap/root, and rsync'd all the data from the old
root to the new root.

I tweaked up the UUID's in /boot/grub2/grub.cfg, /etc/crypttab,
/etc/fstab, and (I think) in the initrd.

However, that failed to boot.  It got as far as dropping into the dracut
shell, and when I manually set up the qubes_dom0/root to be /dev/root and
exited, systemd went a little ways, but then went into some loop where it
kept saying target paths were ready, but did nothing further.  Argh.

2) Second attempt was a raw DD of both /boot and the whole encrypted lvm
partition.  (The destination partitions, luckily, were bigger.)

I then unplugged the original drive (since there'd be conflicting UUID's
now), rebooted, and same deal...  The boot wouldn't mount the crypted
drive, and went into some loop.

Third attempt, I figured I'd do it the more official way, and do a fresh
install of Qubes, and then restore a backup from my old setup.

But with 3.2rc3, I couldn't get the installer to do what I wanted. 
Occasionally I'd get a weird pop-up error about "e not being defined yet"
or something like that.  :S

I tried and tried to coax it into creating a biosboot partition in
/dev/sda1, and making a /dev/sda8 as an encrypted, lvm-containing
partition, to no avail.

The closest I came, when it described the steps it was about to take (nice
feature!), it said it was going to create a partition in /dev/sda8, put an
LVM in that, and then create two Luks partitions, one for swap and one for
root.

That's not what I had before, and not what I wanted.  I wanted the
encryption outside the LVM, which I thought was the standard way of doing
things.

If I choose "automatically partition the drive", will it preserve my
existing #5/#6/#7 extended partitions and just add new partitions as
needed?  I don't want to nuke everything by mistake.

Any suggestions?

Also, on my first attempt to set it up, for the heck of it, I made the
/boot partition encrypted. 
http://www.pavelkogan.com/2014/05/23/luks-full-disk-encryption/

That part seemed to work fine; asked for passphrase right away, decrypted
/boot, loaded xen/vmlinux/initrd and started things rolling.  But the same
systemd failure happened as described above.  So I went back to
non-encrypted /boot.  I do think encrypted /boot might be a good default
or optional feature for Qubes.  Why leave more attack surface than
necessary, and the /boot partition is a pretty big glaring one.

(Why would an attacker care if root is encrypted, or bother with it, if
they have free reign to tamper with an un-encrypted /boot with all it's
kernel-ey and initrd goodness.  It's like locking your front door, but
leaving your basement door wide open.)

Thanks.

JJ

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/4a13a2407f863a5b6a6a6f0ee6d225e4.webmail%40localhost.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Are these needed by Qubes?

2016-09-19 Thread Steve Coleman

On 09/18/2016 11:03 PM, Drew White wrote:

Are these packages (any there of) required by Qubes?


Here is a quick hack to answer this kind of question.

$ cat ./qubes_requires

#!/bin/bash
PACKAGES=`rpm -qa | grep -i qubes`
REQUIRED=`repoquery --requires --recursive --resolve $PACKAGES 2>&1`
for pkg in "$@"
do
   ANS=`echo $REQUIRED | grep -c $pkg`
   if [ $ANS -gt 0 ] ; then
  echo $pkg yes
   else
  echo $pkg no
   fi
done

% ./qubes_requires cdparanoia cdrdao dvd+rw-tools enca
cdparanoia yes
cdrdao no
dvd+rw-tools no
enca yes

You just need to supply a longer list of packages to get the full 
answer, and be careful of short package names that might be a substring 
of other longer package names.



cdparanoia.x86_64 10.2-20.fc23
cdrdao.x86_64 1.2.3-25.fc23
dvd+rw-tools.x86_64 7.1-19.fc23
enca.x86_64 1.18-1.fc23
exempi.x86_64 2.2.1-12.fc23
genisoimage.x86_64 1.1.11-29.fc23
giflib.x86_64 4.1.6-14.fc23
gmime.x86_64 2.6.20-5.fc23
icedax.x86_64 1.1.11-29.fc23
libao.x86_64 1.2.0-5.fc23
libburn.x86_64 1.4.4-1.fc23
libcue.x86_64 1.4.0-6.fc23
libgrss.x86_64 0.7.0-1.fc23
libgsf.x86_64 1.14.33-2.fc23
libgxps.x86_64 0.2.3.2-1.fc23
libiptcdata.x86_64 1.0.4-13.fc23
libisofs.x86_64 1.4.4-1.fc23
libmediaart.x86_64 1.9.0-3.fc23
libosinfo.x86_64 0.2.12-2.fc23
libquvi.x86_64 0.9.4-7.fc23
libquvi-scripts.noarch 0.9.20131130-5.fc23
libusal.x86_64 1.1.11-29.fc23
lua-expat.x86_64 1.3.0-6.fc23
lua-json.noarch 1.3.2-5.fc23
lua-lpeg.x86_64 0.12.2-1.fc23
lua-socket.x86_64 3.0-0.11.rc1.fc23
poppler.x86_64 0.34.0-3.fc23
poppler-glib.x86_64 0.34.0-3.fc23
totem-pl-parser.x86_64 3.10.5-2.fc23
tracker.x86_64 1.6.1-2.fc23
vorbis-tools.x86_64 1:1.4.0-22.fc23



--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e99cb696-7bc8-f51d-98c6-dba417015936%40jhuapl.edu.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] VPN in proxyVM

2016-09-19 Thread Andrew David Wong
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On 2016-09-19 02:48, asdfg...@sigaint.org wrote:
> Hello
> I have this configuration
> 
> sys-whonix--->proxyVM(with VPN)--->appVM
> 
> when I surf in appVM, see ip of tor and not ip of VPN. Why?
> 
> Regards
> 

Please clarify your setup:

What do the arrows mean in your diagram? In the context
of Qubes, such arrows usually mean "has as its NetVM".
For example, this:

   sys-whonix--->proxyVM(with VPN)

would mean "sys-whonix has a ProxyVM (with VPN) as its
NetVM". However, in your case, this wouldn't make sense,
becuase a ProxyVM can't have an AppVM as its NetVM.

Should they be interpreted in the opposite direction?

- -- 
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org
-BEGIN PGP SIGNATURE-
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=mS4B
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e288d6ea-d959-9cc0-fe43-2f925ac44952%40qubes-os.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: rc.local iptables persistence on reboot

2016-09-19 Thread nishiwaka46
Le dimanche 18 septembre 2016 20:36:53 UTC+2, Connor Page a écrit :
> does it start with this?
> #!/bin/sh

Yes

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e8586a2a-1570-44f2-807b-4bb32f2fb707%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] DELL T7400 Suspend to RAM: Machine did not awake

2016-09-19 Thread Zrubecz Laszlo
Sure it is working in general.
I have personally tested a T450 and a DELL E6430 as well.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAF8X2R7MKWXDKp9Vyh1gesOQS1bYO4S6HhuH3d8Xe%3DmZU0H0xQ%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Are these needed by Qubes?

2016-09-19 Thread Marek Marczykowski-Górecki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256

On Sun, Sep 18, 2016 at 08:03:34PM -0700, Drew White wrote:
> Are these packages (any there of) required by Qubes?
> 
> cdparanoia.x86_64 10.2-20.fc23
> cdrdao.x86_64 1.2.3-25.fc23
> dvd+rw-tools.x86_64 7.1-19.fc23
> enca.x86_64 1.18-1.fc23
> exempi.x86_64 2.2.1-12.fc23
> genisoimage.x86_64 1.1.11-29.fc23
> giflib.x86_64 4.1.6-14.fc23
> gmime.x86_64 2.6.20-5.fc23
> icedax.x86_64 1.1.11-29.fc23
> libao.x86_64 1.2.0-5.fc23
> libburn.x86_64 1.4.4-1.fc23
> libcue.x86_64 1.4.0-6.fc23
> libgrss.x86_64 0.7.0-1.fc23
> libgsf.x86_64 1.14.33-2.fc23
> libgxps.x86_64 0.2.3.2-1.fc23
> libiptcdata.x86_64 1.0.4-13.fc23
> libisofs.x86_64 1.4.4-1.fc23
> libmediaart.x86_64 1.9.0-3.fc23
> libosinfo.x86_64 0.2.12-2.fc23
> libquvi.x86_64 0.9.4-7.fc23
> libquvi-scripts.noarch 0.9.20131130-5.fc23
> libusal.x86_64 1.1.11-29.fc23
> lua-expat.x86_64 1.3.0-6.fc23
> lua-json.noarch 1.3.2-5.fc23
> lua-lpeg.x86_64 0.12.2-1.fc23
> lua-socket.x86_64 3.0-0.11.rc1.fc23
> poppler.x86_64 0.34.0-3.fc23
> poppler-glib.x86_64 0.34.0-3.fc23
> totem-pl-parser.x86_64 3.10.5-2.fc23
> tracker.x86_64 1.6.1-2.fc23
> vorbis-tools.x86_64 1:1.4.0-22.fc23

Directly - I don't think so. But I haven't checked for any indirect
dependencies (like some Qubes tools require X and X require one of
those).
Also you haven't specified whether it's about dom0 or VM.


- -- 
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
-BEGIN PGP SIGNATURE-
Version: GnuPG v2

iQEcBAEBCAAGBQJX3/UeAAoJENuP0xzK19cs24sH/R8K8XYrqBCuVHCm1MEAJit9
t6xURGGScipDK4ejpStl2W+iavNGGTNyauazCpyvF1vGcOgw8mZ2yg2DLvKPXBpL
+ecqiGejVOsGXpgy0FxPQMqH1eiVfc0gVlH8XtjdgLObuw3yGUB/J/CQEqAxL4Pt
ZJVnkH1y660iE7f0JtICwkuGL1MA+DAxhUyb6CxPrQzkdHn2Qumq5dZIuGC/7zA8
yBhmS8DWAxUYQbasVZJQqC/aIwafnY1Yo9n/1ofTEvvo6zJCumwKrO68eESMQdFU
ljl2PjKy4mQw95fPiUwGEM7YfCaMUzjk7BRpCwu6THxTVIuFgiwF79eAsk7ayFQ=
=j4D/
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160919142430.GO31510%40mail-itl.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: Usb device

2016-09-19 Thread katerimmel
> On Sun, Sep 18, 2016 at 11:47 AM,  wrote:
>
>> > On Fri, Sep 16, 2016 at 6:38 AM,  wrote:
>> >
>> >> > On Friday, 16 September 2016 06:53:25 UTC+10, kater...@sigaint.org
>> >> wrote:
>> >> >> > On Tuesday, September 13, 2016 at 12:48:50 PM UTC+2,
>> >> >> kater...@sigaint.org
>> >> >> > wrote:
>> >> >> >> Hello
>> >> >> >> I haven't understood yet how open an usb device in Qubes (or in
>> VM
>> >> >> that
>> >> >> >> I
>> >> >> >> choose).
>> >> >> >> Can someone explain me how do I do?
>> >> >> >>
>> >> >> >> Thank you
>> >> >> >
>> >> >> > See here for the how-to, at the bottom for 3.2: ->
>> >> >> > https://www.qubes-os.org/doc/usb/
>> >> >>
>> >> >> I have the 3.1, is it the same?
>> >> >
>> >> > What do you mean by "open up a usb device"?
>> >> > Are you trying to connect via RAW data connection?
>> >> > Are you trying to connect via Telnet or SSH or something?
>> >> > Are you attempting to open a USB Data Device?
>> >> > Are you attempting to connect to a USB NIC/Modem?
>> >> >
>> >> > Please provide details.
>> >> >
>> >> > I have no issues connecting to anything like this on Qubes 2, 3,
>> 3.0,
>> >> 3.1,
>> >> > 3.2RC1.
>> >> >
>> >> > I may be able to help once I know details.
>> >>
>> >> Hello
>> >> Ok, I have attached my usb pen to a VM,
>> >
>> >
>> > that means that on Qubes manager you followed the "attach/detach block
>> > device" item?
>> >
>> >
>> >> now if I want to copy some file on
>> >> this pen, where I find the device? (Usually other OS open
>> automatically
>> >> it)
>> >>
>> >
>> > If you reply yes to the previous question, then you should open
>> Nautilus
>> > in
>> > the VM to which  your device is attached. Nautilus will show a
>> triangle
>> > next to the name of your device. Clicking on than name you open it.
>> > Best
>> > Fran
>> >
>> >
>> >> Thank you
>> >>
>> >>
>> >> --
>> >> You received this message because you are subscribed to the Google
>> >> Groups
>> >> "qubes-users" group.
>> >> To unsubscribe from this group and stop receiving emails from it,
>> send
>> >> an
>> >> email to qubes-users+unsubscr...@googlegroups.com.
>> >> To post to this group, send email to qubes-users@googlegroups.com.
>> >> To view this discussion on the web visit https://groups.google.com/d/
>> >> msgid/qubes-users/b421e84271092b44ebc53dbbc7ee0f5c.webmail%40localhost.
>> >> For more options, visit https://groups.google.com/d/optout.
>> >>
>> >
>> Hello
>> Using nautilus open a window with home, download,desktop, music,
>> picture,
>> video, trash, computer, network, connect to server, but I don't see the
>> folder for pen drive.
>>
>>
> if you do not reply if you attached your pen drive to that VM, how may we
> help?
>
> Thank you
>>
>>
>> --
>> You received this message because you are subscribed to the Google
>> Groups
>> "qubes-users" group.
>> To unsubscribe from this group and stop receiving emails from it, send
>> an
>> email to qubes-users+unsubscr...@googlegroups.com.
>> To post to this group, send email to qubes-users@googlegroups.com.
>> To view this discussion on the web visit https://groups.google.com/d/
>> msgid/qubes-users/783a20df8bfae335812e91eda3a48f32.webmail%40localhost.
>> For more options, visit https://groups.google.com/d/optout.
>>
>
Yes, I have attached the pen

Regards

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/04df2bb1bd41cb5a5f23b602647de998.webmail%40localhost.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: Windows tools - vanishing displays

2016-09-19 Thread grzegorz . chodzicki
W dniu poniedziałek, 19 września 2016 04:48:11 UTC+2 użytkownik Drew White 
napisał:
> Hi folks,
> 
> I'm currently running seamless mode on Win7 with the latest Windows Tools on 
> Q3.2R1 (fully updated).
> 
> I set the seamless GUI in the settings and the window displays, and then it 
> shifts and vanishes after flickering.
> 
> I uncheck the box and click ok and nothing happens, I don't get the display 
> up, I don't get the windows back, I don't get anything.
> 
> Has anything changed in the tools recently to cause this issue to occur?
> 
> Or is it something in Windows causing this?

Are you running dual monitors or a high dpi one? I remember a bug that caused 
seamless Windows to not work on these displays.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8269c7ed-3928-4353-98f2-4f77c08325a2%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Does QubesOs does not source ~/.profile on purpose?

2016-09-19 Thread marc
El lunes, 19 de septiembre de 2016, 10:18:42 (UTC+2), Dave Ewart  escribió:

> If you want something common to all your terminals, regardless of VM,
> you can add a file to /etc/profile.d which includes all your common
> content (e.g. aliases)
> 
> I use
> 
> /etc/profile.d/mystuff.sh
> 
> alias h=history ...

Thanks Dave. For me is ok to add what I need in `~/.bashrc`, I was asking just 
out of curiosity. Anyway, I think not loading home profile files breaks with 
the principle of least surprise, but surely supporting it would add some ugly 
hacks in qubes source code.

By the way, can I read somewhere an extension about how `user` user login 
technically happens (or, better said, not happens)?

Thanks

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b2828068-e7fd-44a9-a0c9-e739d0979c9d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: R3.2-rc3: hotplugging ExpressCard devices

2016-09-19 Thread yaqu
On Sun, 18 Sep 2016 19:40:49 +0200, yaqu 
wrote:

> Hello,
> 
> After upgrading from R3.0 to R3.2-rc3, I am no longer able to hotplug
> ExpressCard devices (e.g. USB 3.0 adapter). Is it a bug or feature?
> 
> When I connect adapter to running Qubes, nothing happens - it is not
> detected, not reported by lspci, also there is nothing in dmesg.
> 
> When I boot Qubes with already connected adapter, it is properly
> detected, attached to dom0, and works fine. But if I disconnect it,
> it is still reported by lspci as connected.
> 
> As a workaround, I have to manually rescan PCI bus after connecting
> adapter:
> $ sudo sh -c 'echo 1 > /sys/bus/pci/rescan'
> 
> And manually remove it after disconnecting:
> $ sudo sh -c 'echo 1 > /sys/bus/pci/devices/:05:00.0/remove'
> 
> It works, but it is not very handy :-(

I'm resending this mail, it looks like it was filtered out or stuck in
moderation queue...

Meanwhile, I've found out it's a feature:
https://github.com/QubesOS/qubes-issues/issues/1673

-- 
yaqu

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160919132332.BE1D4202637%40mail.openmailbox.org.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] lost sound in 3.2-rc3

2016-09-19 Thread Gaijin
Been running 3.2-rc3 and doing regular checks for updates of Qubes. 
Yesterday all was running fine in the sound department. Today, I can't 
get sound in any VM. The machine had been on for several days when this 
happened. Rebooting has not fixed the issue. Pulling up the dom0 audio 
mixer in XFCE seems to have the volume levels up and un-muted. I'm not 
sure where else to look to troubleshoot.


The sound works fine if I boot to another OS on the same machine (DVD). 
The sound hardware seems to work. It's just Qubes affected.


--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/718ebc928b826f0cd81ec7d1d7616a17%40riseup.net.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] VPN in proxyVM

2016-09-19 Thread asdfgher
Hello
I have this configuration

sys-whonix--->proxyVM(with VPN)--->appVM

when I surf in appVM, see ip of tor and not ip of VPN. Why?

Regards



-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7cdf0074a02b2a5da39f3d1e8adce010.webmail%40localhost.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Does QubesOs does not source ~/.profile on purpose?

2016-09-19 Thread Dave Ewart
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

On Sunday, 18.09.2016 at 11:26 -0700, Connor Page wrote:

> technically the user "user" is not logged in so the profile files are
> not sourced. use .bashrc if you want to modify terminal sessions.

If you want something common to all your terminals, regardless of VM,
you can add a file to /etc/profile.d which includes all your common
content (e.g. aliases)

I use

/etc/profile.d/mystuff.sh

alias h=history ...

[I suppose that, by modifying the template in this manner, you might be
making your system more unique and therefore more identifiable if
there's a compromise.  Not an issue for me, but may be a concern for
some.]

Dave.

- -- 
Dave Ewart da...@sungate.co.uk, http://twitter.com/DaveEwart
All email from me is digitally signed, http://www.sungate.co.uk/
GPG key updated Jan 2013 see http://www.sungate.co.uk/gpg
Fingerprint: CF3A 93EF 01E6 16C5 AE7A  1D27 45E1 E473 378B B197
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
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=
=N1ZM
-END PGP SIGNATURE-

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20160919081840.GF11916%40sungate.co.uk.
For more options, visit https://groups.google.com/d/optout.